Commit Graph

78 Commits

Author SHA1 Message Date
Lucien Heuzeveldt
cf4fd36cc4
remove varargs in cs crypto implementation 2022-02-04 15:33:09 +01:00
Gian Demarmels
ca247f6f58
fixed CS signatures and cleanup/refactoring 2022-02-04 15:33:09 +01:00
Gian Demarmels
db9b84970d
add sign and verify implementation 2022-02-04 15:31:50 +01:00
Gian Demarmels
5d2157a8f6
sign_blinded implementation 2022-02-04 15:31:49 +01:00
Gian Demarmels
f1ec1e70a0
implemented planchet_prepare for CS 2022-02-04 15:31:49 +01:00
Gian Demarmels
a02ab8f81b
added CS get R functionality and planchet setup 2022-02-04 15:31:48 +01:00
Gian Demarmels
385eb51e93
CS planchet create and withdraw create 2022-02-04 15:31:48 +01:00
Gian Demarmels
f3fb7c29e6
added CS data structures, implemented CS keypair 2022-02-04 15:31:45 +01:00
Christian Grothoff
98549cdc5a
-fix 2021-11-25 10:00:55 +01:00
591cefd315
[age restriction] progress 3/n
- remove redundant struct members for age commitment hash
- undo pre-mature implementation in taler-exchange-secmod-rsa.c
- carry through age restriction parameter for TALER_denom_blind
2021-11-16 14:43:54 +01:00
c97979d00a
age restriction (load per denomination). 3/n 2021-11-14 16:39:42 +01:00
7c510388b9
age restriction progress 2/n
Signed-off-by: Özgür Kesim <oec-taler@kesim.org>
2021-11-10 17:27:49 +01:00
Christian Grothoff
f01ab79015
RSA-despecialization 2021-11-06 15:29:10 +01:00
Christian Grothoff
c3e244322b
more crypto refactoring 2021-11-05 23:01:21 +01:00
Christian Grothoff
eaf9d728f5
more crypto refactoring 2021-11-05 22:48:11 +01:00
Christian Grothoff
ba627bf84c
-fixes 2021-11-05 22:22:47 +01:00
Christian Grothoff
3eae999efc
distinguish between blind and non-blind denomination signatures 2021-10-31 17:56:56 +01:00
Christian Grothoff
f0951d34dd
-fix more FTBFS 2021-10-27 09:23:13 +02:00
Christian Grothoff
fc371ea18b
start to work on transformation 2021-10-27 09:23:11 +02:00
Christian Grothoff
e1e9250ff7
add check for sufficiently recent version of libgnunetutil, remove now unnecessary crypto blinding logic 2020-12-25 08:44:57 +01:00
Christian Grothoff
699916056b
misc doxygen fixes 2020-12-20 17:10:09 +01:00
82813b337c
copy (un)blinding logic from GNUnet 2020-12-04 12:25:58 +01:00
d3b714922f
conditionally use (un)blinding implementation from libgnunetutil 2020-12-04 12:10:09 +01:00
Christian Grothoff
00350bc228
remove c_hash from planchet detail where it does not logically belong 2020-04-12 16:44:28 +02:00
Christian Grothoff
3404fda463
typos 2020-03-31 20:57:11 +02:00
Christian Grothoff
c597af8334
adjust types to match latest GNUnet API 2020-03-17 01:09:16 +01:00
Christian Grothoff
ffcadbff8c
code cleanup (comments, scoping, naming, indentation) 2020-03-07 00:28:07 +01:00
Christian Grothoff
f979ee9aca
add ENABLE_SANITY_CHECKS #define instead of using '1' 2020-03-01 13:13:33 +01:00
Christian Grothoff
59398cfd76
separate util.c and url.c 2020-01-19 20:33:07 +01:00
Christian Grothoff
5146d62b14
doxygen 2020-01-18 14:16:40 +01:00
Florian Dold
499cff87bf
remove patch_private_key, as it doesn't make any sense
In particular, we were patching the EdDSA private keys, which are
*hashed* before doing the curve multiplication.  Thus clearing the bits
*before* the hashing doesn't make any sense at all.  These bits are
cleared anyway when deriving the public key.
2019-11-28 00:24:05 +01:00
Christian Grothoff
385b3e77df
tighten formatting rules 2019-10-31 12:59:50 +01:00
Christian Grothoff
b9dee3a1d5
fix compiler warnings, add assertions 2019-09-05 11:11:30 +02:00
Florian Dold
eb55997084
re-format code 2019-08-25 16:18:24 +02:00
Christian Grothoff
de9fdf860a
replace denom_pub with denom_pub_hash in exchange API to reduce bandwidth 2019-05-02 21:16:51 +02:00
Christian Grothoff
499247a480
fixing #5178 2017-11-29 20:23:08 +01:00
Christian Grothoff
2f2930f1ba
major API refactoring, adding planchet generation and coin extraction APIs to the Taler crypto library, thereby simplifying code in withdraw, refresh, tipping, payback and testcases; slight API incompatibilities to previous versions are introduced 2017-10-31 14:02:54 +01:00
Christian Grothoff
ec8146de92
rename: TALER_setup_planchet -> TALER_planchet_setup_refresh 2017-10-31 12:44:17 +01:00
Christian Grothoff
a491a4709a
rename: TALER_FreshCoinP -> TALER_PlanchetSecretsP, and TALER_setup_fresh_coin -> TALER_setup_planchet 2017-10-31 12:38:14 +01:00
Christian Grothoff
1e30d60a25
fixing misc doxygen issues 2017-06-04 11:30:43 +02:00
Christian Grothoff
487237381d
fix misc doxygen issues 2017-04-20 07:49:56 +02:00
Jeff Burdges
3115c6acc6 Kinda seems to work 2016-08-11 22:18:04 +02:00
Jeff Burdges
1f39f7e92b This might fix the compile error 2016-08-11 21:28:48 +02:00
Jeff Burdges
cdcd67a27d Use KDF better
We now send the secret_seed to the skm variable, while sending the
counter salt to the xts variable.  I have not check this with
http://eprint.iacr.org/2010/264 but it seems correct.

Indeed rsa_blinding_key_derive places the strong source of
randomness in skm too, and uses a constant string for xts.
2016-08-08 12:43:59 +02:00
Jeff Burdges
7958464696 Copy bit twiddling from libgcrypt/cipher/ecc.c
Reversed order buisness agrees with KC's experence from gnunet-rs
2016-08-08 10:38:07 +02:00
Christian Grothoff
745719dbc1 first half of changing refresh protocol to derive all key data from DH 2016-08-05 16:08:19 +02:00
Marcello Stanisci
59c6856284 fixing #4594 2016-07-07 17:55:25 +02:00
Christian Grothoff
32bb3b14bf fix #4483 2016-05-24 20:13:31 +02:00
Christian Grothoff
80f6c4240e -fix (C) notices 2016-01-19 14:39:00 +01:00
Christian Grothoff
c6f88ebd61 doxygen-fixes 2015-08-09 15:40:16 +02:00